General

  • Target

    b58f7c76362a0d0af986a8dc3d121ab4dd3fef1af2c0257adade8cf314433ced

  • Size

    65KB

  • Sample

    250128-csph2atnh1

  • MD5

    02dee3cbfdb8e1ec6c7731ade5571d03

  • SHA1

    3b6647a21682d18ce5f6e53be2fc0a6177cde210

  • SHA256

    b58f7c76362a0d0af986a8dc3d121ab4dd3fef1af2c0257adade8cf314433ced

  • SHA512

    31db246d14a38e5789c8efe693a1cc5f9a8fb14c93120fd7e04f5c43b92e0cb009324a4c009eed181f246e23176cd28d79f00c2a2d6d9c2a7fac73624dba6317

  • SSDEEP

    1536:TJd49V5rQjbNIKQqTOhhRYlMjMtTemxXR0LiallA5:TJdKtQXAnYgmxh0L9U

Malware Config

Extracted

Family

sality

C2

http://89.119.67.154/testo5/

http://kukutrustnet777.info/home.gif

http://kukutrustnet888.info/home.gif

http://kukutrustnet987.info/home.gif

Targets

    • Target

      b58f7c76362a0d0af986a8dc3d121ab4dd3fef1af2c0257adade8cf314433ced

    • Size

      65KB

    • MD5

      02dee3cbfdb8e1ec6c7731ade5571d03

    • SHA1

      3b6647a21682d18ce5f6e53be2fc0a6177cde210

    • SHA256

      b58f7c76362a0d0af986a8dc3d121ab4dd3fef1af2c0257adade8cf314433ced

    • SHA512

      31db246d14a38e5789c8efe693a1cc5f9a8fb14c93120fd7e04f5c43b92e0cb009324a4c009eed181f246e23176cd28d79f00c2a2d6d9c2a7fac73624dba6317

    • SSDEEP

      1536:TJd49V5rQjbNIKQqTOhhRYlMjMtTemxXR0LiallA5:TJdKtQXAnYgmxh0L9U

    • Modifies firewall policy service

    • Sality

      Sality is backdoor written in C++, first discovered in 2003.

    • Sality family

    • Windows security bypass

    • Windows security modification

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks